Number of attacks per month | Unlimited |
---|---|
Gbps limit of attack | Unlimited |
Duration of attacks per month | Unlimited |
Type of attack | All |
Detection and Auto-Mitigation | ![]() |
11 Tbps of additional network | ![]() |
ANTI-DDOS Mitigation
GIGEBOX is committed to protecting your project 24/7 against any type of DDoS attack, regardless of duration or size.

What is anti-DDoS protection?
As the volume of data that exists on the internet grows exponentially, distributed denial-of-service (DDoS) attacks are becoming increasingly common.
A DDoS attack aims to make a server, service or infrastructure unavailable. An attack can take on different forms.
It may saturate the server’s bandwidth to make it unreachable, or it may overwhelm the machine’s system resources.
During a DDoS attack, requests are sent in high numbers at the same time from multiple points on the internet.
The intensity of this crossfire renders the service unstable, and sometimes unavailable.
Targets and types of attacks
There are three ways of making your site, server or infrastructure unavailable:
- Bandwidth: this type of attack consists of saturating the server's network capacity, which renders it unreachable.
- Resources: this type of attack consists of depleting the machine's system resources, which prevents it from responding to legitimate requests.
- Exploitation of software fault: also called "exploit", this type of attack targets a particular software fault either to make the machine unavailable or to take control of it.
What we offer to protect your services
To protect your servers an exclusive combination of techniques to prevent attack:
- Analyse all packets at high speed in real time
- Vacuum your server's incoming traffic
- Mitigate the illegitimate IP packets, while allowing legitimate ones to pass through
Targets and types of attacks
There are three ways of making your site, server or infrastructure unavailable:
- Bandwidth: this type of attack consists of saturating the server's network capacity, which renders it unreachable.
- Resources: this type of attack consists of depleting the machine's system resources, which prevents it from responding to legitimate requests.
- Exploitation of software fault: also called "exploit", this type of attack targets a particular software fault either to make the machine unavailable or to take control of it.
THE BEST CHOICE IN HOSTING SERVICES
Our data centers offer complete redundancy in power, HVAC, network connectivity, and security.